Security category posts:

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google ...[see the full post]

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer ...[see the full post]

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ...[see the full post]

In this Intel Chip Chat audio podcast with Allyson Klein: Oliver Chen, Product Marketing Manager for American Portwell Technology, chats about the company’s new CAD-0230 network communication security appliance based on the Intel Atom C2000 processor. This system allows for ...[see the full post]

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs ...[see the full post]

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated ...[see the full post]

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear ...[see the full post]

Business Solutions for IT Managers: CompatibleOne collaborates with Intel to develop automated cloud brokerage service using Intel Trusted Execution Technology to boost confidence in the security of cloud services.

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices ...[see the full post]

IT Business Value: In this video Intel CIO, Kim Stevenson, shares her organization’s 2013 IT priorities and strategies for accelerating Intel’s growth in a time of tremendous change. Learn how Intel IT is partnering with the business to achieve Intel’s ...[see the full post]

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the ...[see the full post]

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity ...[see the full post]

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...[see the full post]